verifyRequestSignature()
Verify webhook payloads when they’re using common signing methods.
Most webhooks come with a signature in the request header. This signature is used to verify that the request is coming from the expected source. To verify you typically need to take the body of the payload, hash it and compare it with the signature in the header. You use a secret when you hash the payload to make sure that the payload hasn’t been tampered with.
When using HttpEndpoint you are required to verify the payload. verifyRequestSignature()
is a helper function that makes this easy for the majority of webhooks.
Parameters
The web request that you want to verify.
The name of the header that contains the signature. E.g. X-Cal-Signature-256
.
The header encoding. Defaults to hex
.
The secret that you use to hash the payload. For HttpEndpoints this will usually originally come from the Trigger.dev dashboard and should be stored in an environment variable.
The hashing algorithm that was used to create the signature. Currently only sha256
is
supported.
Returns
Whether the signature is valid or not
If success
is false then you can provide the reason it failed. This is dealt with for you by
the verifyRequestSignature()
function.
Was this page helpful?